Guy DupuyThe Best Dunk Ever
This is the best dunk ever.
Dunker showed here is Guy Dupuy.
3 combination off-the-bounce, then a guy standing,
and between the legs dunk.
no one has ever done that before.
This is THE one crazy best dunk ever.
Xegben is Iron Fist
After how many months my brute is now One of the ranking Iron Fist.
I am rank as Iron Fist because Xegben reach the 128th final for the tournament.
Its been quite some time since my rank advanced, from padawan, desert batterer to Iron Fist.
Adolf Hitler Sex Video
This video is a campaign for aid on hiv victims.
The supposed video would be released in Germany television.
It has sparked criticism from other charity organization for HIV victims.
This content sexual acts, as the couple undress on a dim lit room. Adding the twist is Adolf Hitler revealed as the man behind; depicting evil deeds or simply the mass murderer as the AIDS/HIV.
The Most Insane Martial Arts Movie Ong-Bak2
I was wondering around the street of San Pedro, together with my friend and fellow blogger Greg. We were watching Indak indak sa Kadalanan a part of KAdayawan Festival here in davao. As we go along i bought a dvd copy of Ong-Bak2. After I got home i watch it alone and to my surprise the plot of the movie was a bit clouded, but that doesnt matter i enjoy watching Tony Jaa (Teean) kick the hell out of his opponent. The movie is non-stop action, if you fancy martial arts then this movie is for you; kung-fu, samurai sword weilding techniques, various weapons mastery, muay thai, nun-chucks and a lot of kick-ass moves with combination of all those martial arts.
Darth Vader Dance
TAGGED- 5 School Facts
Rich Tagged Me..So Here's My School facts....
Simpsonize Me
<---My Version in Simpsons World.
Police arrest naked 'Terminator'
Gorrila Foot Shoes
NK suspect for US and South Korea Cyber Attack
The powerful attack that overwhelmed computers at U.S. and South Korean government agencies for days was even broader than realized, also targeting the White House, the Pentagon and the New York Stock Exchange. An early analysis of the malicious software used in the attack found its targets also included the National Security Agency, Homeland Security Department, State Department, the Nasdaq stock market andThe Washington Post. Many of the organizations appeared to successfully blunt the sustained attacks. The Associated Press obtained the target list from security experts analyzing the attack. It was not immediately clear who might be responsible or what their motives were. The attack was remarkably successful. The widespread attack knocked out the Web sites of the Treasury Department, the Secret Service and other U.S. government agencies, according to officials inside and outside the government. Sites in South Korea were also affected, and South Korean intelligence officials believe the attack was carried out by North Korean or pro-Pyongyang forces. The U.S. government Web sites, which also included those of the Federal Trade Commission and the Transportation Department, were all down at varying points over the holiday weekend and into this week. South Korean Internet sites began experiencing problems Tuesday. U.S. officials refused to publicly discuss details of the cyber attack. But South Korea's National Intelligence Service, the nation's main spy agency, told a group of South Korean lawmakers Wednesday that it believes that North Korea or North Korean sympathizers in the South "were behind" the attacks, according to an aide to one of the lawmakers briefed on the information. The aide spoke on condition of anonymity, citing the sensitivity of the information. The National Intelligence Service — South Korea's main spy agency — said it couldn't immediately confirm the report, but it said it was cooperating with American authorities. Amy Kudwa, spokeswoman for the Homeland Security Department, said the agency's U.S. Computer Emergency Readiness Team issued a notice to federal departments and other partner organizations about the problems and "advised them of steps to take to help mitigate against such attacks." Others familiar with the U.S. outage, which is called a denial of service attack, said the fact that the government Web sites were still being affected three days after it began signaled an unusually lengthy and sophisticated attack. Two government officials acknowledged that the Treasury and Secret Service sites were brought down, and said the agencies were working with their Internet service provider to resolve the problem. The officials spoke on condition of anonymity because they were not authorized to speak on the matter. Ben Rushlo, director of Internet technologies at Keynote Systems, said problems with the Transportation Department site began Saturday and continued until Monday, while the FTC site was down Sunday and Monday. Keynote Systems is a mobile and Web site monitoring company based in San Mateo, Calif. The company publishes data detailing outages on Web sites, including 40 government sites it watches. According to Rushlo, the Transportation Web site was "100 percent down" for two days, so that no Internet users could get through to it. The FTC site, meanwhile, started to come back online late Sunday, but even on Tuesday Internet users still were unable to get to the site 70 percent of the time. Web sites of major South Korean government agencies, including the presidential Blue House and the Defense Ministry, and some banking sites were paralyzed Tuesday. An initial investigation found that many personal computers were infected with a virus ordering them to visit major official Web sites in South Korea and the U.S. at the same time, Korea Information Security Agency official Shin Hwa-su said.
Some of the affected government Web sites were still reporting problems days after it started during the July 4 holiday.
Google Chrome Offline Installation
Let Me share some hack for installing google chrome.
Click Sense Web site
Hi i wanna share this site..
Transformers USB Drive
The Best USB Drive ever. the model is Ravage, a fierce jungle cat Decepticon. This is a transforming USB Drive from normal usb drive to Ravage. you can order it here
Features :
- Windows98/Me/2000/XP/Vista,Mac
- Interface : USB 1.1 & USB 2.0
- Speed USB 2.0 : 480mpbs
- Speed USB 1.1 : 12mpbs
- Memory : 2 gigabytes
Product Number: TAK10927 Shipping Weight: 0.84 pounds |
MyBrute
I am having a great time playing this game. when i invite my friends playing this, i cant help but to mention "it is pokemon look a like battle" you have a cell instead of poke balls. but wait the best part is it is so random. that even fighting higher level brute wouldnt matter. You cant try it for yourself at My Brute Website You have a fight limit per day so you dont need to have addict mode MMORPG style to level up, just choose the right opponent and have some random luck
the picture above is my brute winning in a battle against another brute. have a nice battle in the arena. and hope to see you rise on the ranks of elite brute.
A Taste for Love Lyrics
Dracula:
This is a song that I never thought I would write
On the night that I'm dying
Sorry for all the wrong I've done.
I'm finished trying.
It was a wonderful dream...
Now let him come and slay me.
Van Helsing:
There he is!
The demon who haunted the streets of London!
I've come to slay you,
Dracula:
Here I am!
I'll leave you bleeding in my dungeon...
I'll never obey you,
I'll rip out your oesophagus!
Dracula's Lover:
Please, Mr Van Helsing,
Listen to me.
He is just a man
Who wishes to be free!
Female Villager:
Lay him in a hearse
You must end this curse!
Male Villager:
He is the worst!
[ Dramatic fight, Van Helsing stabs Dracula with a stake into his heart. ]
Dracula's Lover:
Don't go, my love.
I can't say goodbye...
Dracula:
My reign is done!
It's time to die.
Dracula's Lover:
I'm pregnant.
Chorus:
Dracula ...
Van Helsing:
What have I done!
Who killed Dracula!
Chorus:
... Has flown above,
But he found a taste
A taste for love.
Van Helsing:
My life is a lie...
Dracula's Lover:
Sweet Dracula,
I miss my undead prince.
I'll never see him again,
Until my death.
Chorus:
... What a wonderful dream,
To find a taste for love,
A taste for love.
Save the Developers!
Please Stop Using IE6 and save a lot of time for the web developers.
This project aims to upgrade microsoft web browser to higher platform from IE 7 to IE 8 or download alternative browser. IE7 has been arounb but majority of the web browser used by user is still IE6. many of these are Universities and School, who has XP installed and not yet upgraded to Vista, or waiting for the release of Windows 7 later this year.
The problem is IE6 dont follow web standards, many sites are messed up through IE6 browser. I personally hate to create a second css file to hack IE6 rendering.
save us some time to be more productive...or go to this site
The main problem is i have to install IE tester on vista just to simulate IE6, IE 5.5, IE 7, IE 8 for my projects, removing IE lower versions would be a real relief. heheheXD...
Researcher cracks Mac in 10 seconds at PWN2OWN, wins $5k
Charlie Miller defends his title; IE8 also falls on Day One of hacking contest
March 18, 2009 (Computerworld) Charlie Miller, a security researcher who hacked a Macintosh in two minutes last year at CanSecWest's PWN2OWN contest, improved his time today by breaking into another Macintosh in under 10 seconds.
Miller, an analyst at Independent Security Evaluators in Baltimore, walked off with a $5,000 cash prize and the MacBook he hacked.
"I can't talk about the details of the vulnerability, but it was a Mac, fully patched, with Safari, fully patched," said Miller on Wednesday, not long after he had won the prize. "It probably took five or 10 seconds." He confirmed that he had researched and written the exploit before he arrived at the challenge.
The PWN2OWN rules stated that the researcher could provide a URL that hosted his exploit, replicating the common hacker tactic of enticing users to malicious sites where they are infected with malware. "I gave them the link, they clicked on it, and that was it," said Miller. "I did a few things to show that I had full control of the Mac."
Two weeks ago, Miller predicted that Safari running on the Macintosh would be the first to fall.
PWN2OWN's sponsor, 3Com Corp.'s TippingPoint unit, paid Miller $5,000 for the rights to the vulnerability he exploited and the exploit code he used. As it has at past challenges, it reported the vulnerability to on-site Apple representatives. "Apple has it, and they're working on it," added Miller.
According to Terri Forslof, manager of security response at TippingPoint, another researcher later broke into a Sony laptop that was running Windows 7 by exploiting a vulnerability in Internet Explorer 8. "Safari and IE both went down," she said in an e-mail.
TippingPoint's Twitter feed added a bit more detail to Forslof's quick message: "nils just won the sony viao with a brilliant IE8 bug!"
Forslof was not immediately available to answer questions about the IE8 exploit.
TippingPoint will continue the PWN2OWN contest through Friday, and will pay $5,000 for each additional bug successfully exploited in Safari, Internet Explorer 8, Firefox or Google's Chrome. During the contest, IE8, Firefox and Chrome will be available on the Sony, while Safari and Firefox will be running on the MacBook. The researcher who exploited IE8 will, like Miller, be awarded not only the cash, but also the laptop.
"It was great," said Miller when asked how it felt to successfully defend his title. "But I was really nervous for some reason this time. Maybe it was because there were more people around. Lucky [the exploit] was idiot-proof, because if I had had to think about it, I don't know if I'd had anything."
This year's PWN2OWN also features a mobile operating system contest that will award a $10,000 cash prize for every vulnerability successfully exploited in five smartphone operating systems: Windows Mobile, Google's Android, Symbian, and the operating systems used by the iPhone and BlackBerry.
Miller said he won't enter the mobile contest. "I can't break them," said Miller, who was one of the first researchers to demonstrate an attack on the iPhone in 2007, and last year was the first to reveal a flaw in Android. "I don't have anything for the iPhone, and I don't know enough about Google."
CanSecWest, which opened Monday, runs through Friday in Vancouver, British Columbia.
Project Guru:Family Tech Support
Everyone seems to have a “go to” geek among their extended family or group of friends — someone who handles all their tech problems for them. But that go-to geek doesn’t necessarily live close enough to drop in whenever there’s a problem. Symantec’s new “Project Guru” service, which it’s announcing today, gives those geeks a way to provide tech support to friends and family members remotely.
This project — Symantec’s third presentation at the DEMO show in recent years — is a work in progress aimed at setting up a trusted network for family members.
Brian Hernacki, an architect at Cupertino, Calif.-based Symantec, said the service is run through a portal, where the go-to “guru” can log in to create a trusted group, invite the family member or friend needing help to join that group, and then take remote control of that person’s computer to see what the problem is.
In that sense, the service is just like CrossLoop and other remote-help technologies that allow someone to see what’s happening on someone else’s desktop and take control of it. But Project Guru is different in that users simply click yes to accept a remote help session. That is, the guru has fancy computer commands at his or her disposal, but the dummy on the other end simply has to click with a mouse once.
On the guru’s desktop, Symantec will provide a bunch of data about the other PC that can help the guru diagnose any problems from afar. The exact details on this data have yet to be announced, Hernacki said. The connection between the guru and the friend or family member is secured via encryption technology.
Project Guru will include software-as-a-service features, such as the Norton Live online support service. And while some remote desktop services are clunky and slow, Symantec intends this one to operate at high speed. It’ll be interesting to see if the company can deliver on that goal, since commands sent over the internet naturally suffer from time lag. The company has a closed pilot in progress now and will open it up to a public beta test later this year.
The DEMO 2009 conference starts today and runs through Tuesday in Palm Desert, Calif. We will be covering it live throughout the show.
Attack on Firefox
Mozilla Firefox users are being targeted by a new Trojan that steals online banking passwords.
According to security researchers at BitDefender, Trojan.PWS.ChromeInject.A identifies banking and money transfer websites such as Barclays and PayPal though JavaScript, and then collates the logins and passwords before forwarding them to server in Russia.
firefox_logo_100_sqThe malware, which is being spread by drive-by downloads or by duping users into downloading it, is stored in the Firefox add-on folder and is registered as 'Greasemonkey', which are scripts that add extra functionality to Firefox. It starts working as soon as the browser is opened.
However, the malware is not being obtained from Mozilla's official Firefox add-on site and the software manufacturer ensures all new add-ons are scanned for threats before being published.
Viorel Canja, the head of BitDefender's lab, explained that Firefox's increasing market share may be one reason why malware authors are targeting the browser.
Canja urged Firefox users worried about the Trojan to only download signed, verified software.
The Open Sourcerer said on Saturday, 06 December 2008
This story is so bad... First the malware only gets inserted once your computer has already been compromised by something else first.
Secondly - this ONLY affects Windows (surprise surprise). If you use Firefox on Linux or Mac, you are fine.
Hell Noire said on Monday, 08 December 2008
Would you like to name the add-on so we know to avoid it?
redstringuitar said on Wednesday, 10 December 2008
Bitdefender shares a business interest with Microsoft, you can only access their online scanner using active-x through IE. They're just doing Big Daddy a favour!
Gazelle - To end Internet Explorer Line
Microsoft researchers are developing a new Web browser that they say could offer a far greater degree of security than Google's Chrome, Mozilla's Firefox or Microsoft's own Internet Explorer.
The browser, called Gazelle, relies on 5,000 lines of C# code called a "browser kernel" that helps enforce security rules to prevent malicious access to the PC's underlying operating system, according to a recently publishedpaper.
So far, Gazelle is just a prototype, with other parts of the browser based on Microsoft's IE. Due to the complex nature of the way it processes Web pages for better security, the browser's performance is more tortoise than gazelle, but the researchers think a few tweaks can make it faster.
Gazelle is different from some other browsers in that it considers each part of a Web site - such as iframes, subframes and plugins - as separate elements. Some of those elements can pull in malicious content from other Web sites. Google's Chrome runs a Web page and its elements in a single process.
The Microsoft researchers argues that their approach brings more reliability and better security since processes can't interact with the underlying system and are mediated by system calls supplied by the browser kernel.
In the paper, the Microsoft researchers are surprisingly critical of the company's forthcoming Web browser, IE8, which uses an approach similar to Chrome by using tabs to isolate processes.
"This granularity is insufficient since a user may browse multiple mutually distrusting sites in a single tab, and a web page may contain an iframe with content from an untrusted site (e.g., ads)," the paper reads.
Gazelle goes so far as to separate elements of a Web page that come from the same registrar-controlled domain. For example, content from ad.datacenter.com and user.datacenter.com would be considered separate, whereas Chrome "puts them into the same site instance," the paper said.
Blocking race condition attacks
Another interesting feature of Gazelle is aimed at blocking so-called race condition attacks. In that scenario, an attacker creates a Web page aimed at making a user click on an area of the page. But just before the predicted click happens, an overlay is drawn into the page, which could cause a user to be attacked.
Gazelle will ignore any clicks in newly exposed screen areas for about one second until a user can see the new screen areas.
Gazelle also aims to limit the dangers posed by programming flaws in browser plugins. Plugins are small bits of code that enable other programs to run within a browser, but they've also been known to contain vulnerabilities that can allow a PC to be hacked.
In Gazelle, the plugins are sandboxed, or isolated from the rest of the system, so that a bad plugin would only affect the particular Web page's plugin process and not the whole PC.
But one huge problem with Gazelle's approach is that existing plugin code would have to be rewritten or ported to interact with Gazelle's browser kernel system calls. That's difficult since plugins are written by a wide variety of software vendors whose development schedules don't necessarily work in perfect sync with those of browser developers.
Other parts of Gazelle borrow from IE code not related to security. For example, the researchers said they didn't want to write a new HTML parser, so they used IE7's Trident renderer and JavaScript engine.
In compatibility tests, Gazelle correctly rendered 19 of the top 20 sites ranked by Web survey firm Alexa.
The paper warns that the new security of Gazelle does introduce "performance overhead" - especially for sites such as the New York Times Web site - but further work should be able to make it faster.
Obama Icon
Last december I uploaded this photo as an avatar in my forum. As you can see it resembles Obama's Iconic Poster. well you could have the same avatar and customize it using the online editor from this site, you must have the latest flash. no need to be photoshopped guru..just picture upload then download youre obama icon now.
The Square Root Day
Yesteday is the square root day
03/03/09
fun on dates math fans.
the last square root day dates back in 02/02/04
and the next square root day will be held seven years from now.
04/04/16
looks like the planets have aligned...lols
Simple VBS Script to play with
Dim i
For i = 1 to 100
If (i Mod 3 = 0) And (i Mod 5 = 0) Then
Wscript.Echo "Xegben-Kuring"
ElseIf (i Mod 3 = 0) Then
Wscript.Echo "kuring"
ElseIf (i Mod 5 = 0) Then
Wscript.Echo "xegben"
Else
Wscript.Echo i
End If
Next
save this to notepad with file extension of vbs,
then create a shortcut to desktop. set its icon to IE for example
rename your shortcut to Internet Explorer.
you could set i from 1 to 100 or exceed it to 1000.lols (>'.'<)+(='.'=)
HTTP - HTTPS in vb.net
Dim redirectUrl As String = Request.Url.ToString().Replace("http:", "https:")
Response.Redirect("URL", True)
End If
easy cut and paste code for redirecting http to https
MS-Word Trick
Open Microsoft Word and type
=rand(200,99)
and then HIT ENTER....
or what was it you just typed right now?
Dracula's Lament
Dracula's LamentIt's getting kind of hard to believe things are going to better.
I've been drowning too long to believe that the tide's going to turn.
And I've been living too hard to believe things are going to get easier now.
I'm still trying to shake off the pain from the lessons I've learned.
And if I see Van Helsing I swear to the Lord I will slay him. AH-HAH-HAH-HAH!
He'd take it from me, but I swear I won't let it be so. AH-HAH-HAH-HAH!
Blood will run down his face when he is decapitated. AH!
His head on my mantle is how I will let this one know: how much I love you.Die.
Die.
Die.
I can't.
Song Taken From the Movie Forgetting Sarah Marshall
one of my favorite movies
other soundtrack is cool such as:
Inside of you - infant sorrow
‘A’ohe like me ‘oe - cover for "nothing compares 2U"